Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Derandomizing Algorithms on Product Distributions and Other Applications of Order-Based Extraction., and . ICS, page 397-405. Tsinghua University Press, (2010)Efficient polynomial commitment schemes for multiple points and polynomials., , , and . IACR Cryptology ePrint Archive, (2020)Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model., and . IACR Cryptology ePrint Archive, (2018)A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK., , and . IACR Cryptology ePrint Archive, (2017)Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments., , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 649-680. Springer, (2021)Simple Affine Extractors Using Dimension Expansion., and . CCC, page 50-57. IEEE Computer Society, (2010)Subspace Polynomials and Cyclic Subspace Codes., , , and . CoRR, (2014)Non-Interactive Secure Multiparty Computation., , , , , and . CRYPTO (2), volume 8617 of Lecture Notes in Computer Science, page 387-404. Springer, (2014)Improved concrete efficiency and security analysis of Reed-Solomon PCPPs., , , and . Electron. Colloquium Comput. Complex., (2016)Extractors for Polynomials Sources over Constant-Size Fields of Small Characteristic., and . Electron. Colloquium Comput. Complex., (2011)